researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IET Information Security
Home
Index
Info
Issue
Volume
4
, Issue
2
45
--
48
B. Wang
.
On the security of an identity-based proxy multi-signature scheme
49
--
61
Vesselin Velichkov
,
Vincent Rijmen
,
Bart Preneel
.
Algebraic cryptanalysis of a small-scale version of stream cipher Lex
62
--
67
Feng Hao
,
Peter Y. A. Ryan
,
Piotr Zielinski
.
Anonymous voting by two-round public discussion
68
--
79
Kun Wang
,
Meng Wu
.
Cooperative communications based on trust model for mobile ad hoc networks
80
--
92
Yoones Asgharzadeh Sekhavat
,
Mohammad Fathian
.
Mining frequent itemsets in the presence of malicious participants
93
--
103
Mitra Fatemi
,
Somayeh Salimi
,
Ahmad Salahi
.
Anonymous roaming in universal mobile telecommunication system mobile networks
104
--
110
Wenqiang Wang
,
Shaozhen Chen
.
Attribute-based ring signature scheme with constant-size signature